Basic concepts and taxonomy of dependable and secure computing

A Avizienis, JC Laprie, B Randell… - IEEE transactions on …, 2004 - ieeexplore.ieee.org
This paper gives the main definitions relating to dependability, a generic concept including a
special case of such attributes as reliability, availability, safety, integrity, maintainability, etc …

Model-based evaluation: from dependability to security

DM Nicol, WH Sanders… - IEEE Transactions on …, 2004 - ieeexplore.ieee.org
The development of techniques for quantitative, model-based evaluation of computer system
dependability has a long and rich history. A wide array of model-based evaluation …

Selfish MAC layer misbehavior in wireless networks

P Kyasanur, NH Vaidya - IEEE transactions on mobile …, 2005 - ieeexplore.ieee.org
Wireless medium access control (MAC) protocols such as IEEE 802.11 use distributed
contention resolution mechanisms for sharing the wireless channel. In this environment …

[PDF][PDF] Detection and Handling of MAC Layer Misbehavior in Wireless Networks.

P Kyasanur, NH Vaidya - DSN, 2003 - Citeseer
Selfish hosts in wireless networks that fail to adhere to the MAC protocol may obtain an
unfair share of the channel bandwidth. We present modifications to the IEEE 802.11 backoff …

[PDF][PDF] 基于随机博弈模型的网络攻防量化分析方法

王元卓, 林闯, 程学旗, 方滨兴 - 计算机学报, 2010 - cjc.ict.ac.cn
摘! 要! 针对日益普遍和多样的网络攻击和破坏行为如何利用模拟真实网络的虚拟环境实现对
网络各种攻防过程的实验推演并分析评价网络系统安全性已逐渐成为热点研究方向9 …

Dynamical analysis of diversity in rule-based open source network intrusion detection systems

H Asad, I Gashi - Empirical Software Engineering, 2022 - Springer
Diverse layers of defence play an important role in the design of defence-in-depth
architectures. The use of Intrusion Detection Systems (IDSs) are ubiquitous in this design …

Diversity in open source intrusion detection systems

H Asad, I Gashi - Computer Safety, Reliability, and Security: 37th …, 2018 - Springer
We present an analysis of the diversity that exists in the rules and blacklisted IP addresses of
the Snort and Suricata Intrusion Detection Systems (IDSs). We analysed the evolution of the …

Analysis of techniques for building intrusion tolerant server systems

F Wang, R Uppalli, C Killian - IEEE Military Communications …, 2003 - ieeexplore.ieee.org
The theme of intrusion detection systems (IDS) is detection because prevention mechanisms
alone are not guaranteed to keep intruders out. The research focus of IDS is therefore on …

Dependability and performance evaluation of intrusion-tolerant server architectures

V Gupta, V Lam, HGV Ramasamy, WH Sanders… - Latin-American …, 2003 - Springer
In this work, we present a first effort at quantitatively comparing the strengths and limitations
of various intrusion-tolerant server architectures. We study four representative architectures …

Building survivable services using redundancy and adaptation

MA Hiltunen, RD Schlichting… - IEEE Transactions on …, 2003 - ieeexplore.ieee.org
Survivable systems-that is, systems that can continue to provide service despite failures,
intrusions, and other threats-are increasingly needed in a wide variety of civilian and military …